The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matthew K. Franklin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew K. Franklin, Tomas Sander
    Commital Deniable Proofs and Electronic Campaign Finance. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:373-387 [Conf]
  2. Dan Boneh, Matthew K. Franklin
    Anonymous Authentication with Subset Queries (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:113-119 [Conf]
  3. Glenn Durfee, Matthew K. Franklin
    Distribution chain security. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:63-70 [Conf]
  4. Matthew K. Franklin, Michael K. Reiter
    Fair Exchange with a Semi-Trusted Third Party (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:1-5 [Conf]
  5. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
    The Omega Key Management Service. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:38-47 [Conf]
  6. Dan Boneh, Matthew K. Franklin
    Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:213-229 [Conf]
  7. Dan Boneh, Matthew K. Franklin
    Efficient Generation of Shared RSA Keys (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:425-439 [Conf]
  8. Dan Boneh, Matthew K. Franklin
    An Efficient Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:338-353 [Conf]
  9. Matthew K. Franklin, Stuart Haber
    Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:266-277 [Conf]
  10. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:19-32 [Conf]
  11. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    A Generic Construction for Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:81-98 [Conf]
  12. Matthew K. Franklin, Mark Gondree, Payman Mohassel
    Improved Efficiency for Private Stable Matching. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:163-177 [Conf]
  13. Dan Boneh, Glenn Durfee, Matthew K. Franklin
    Lower Bounds for Multicast Message Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:437-452 [Conf]
  14. Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter
    Low-Exponent RSA with Related Messages. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:1-9 [Conf]
  15. Ronald Cramer, Matthew K. Franklin, Berry Schoenmakers, Moti Yung
    Multi-Autority Secret-Ballot Elections with Linear Work. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:72-83 [Conf]
  16. Matthew K. Franklin, Michael K. Reiter
    Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:50-63 [Conf]
  17. Matthew K. Franklin, Rebecca N. Wright
    Secure Communications in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:346-360 [Conf]
  18. Matthew K. Franklin, Moti Yung
    The Blinding of Weak Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:67-76 [Conf]
  19. Matthew K. Franklin, Dahlia Malkhi
    Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:151-160 [Conf]
  20. Matthew K. Franklin, Gene Tsudik
    Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:90-102 [Conf]
  21. Matthew K. Franklin, Zvi Galil, Moti Yung
    Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems [Citation Graph (0, 0)][DBLP]
    FOCS, 1993, pp:670-679 [Conf]
  22. Matthew K. Franklin, Moti Yung
    Secure and Efficient Off-Line Digital Money (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICALP, 1993, pp:265-276 [Conf]
  23. Armen Gabrielian, Matthew K. Franklin
    Multi-Level Specification and Verification of Real-Time Software. [Citation Graph (0, 0)][DBLP]
    ICSE, 1990, pp:52-62 [Conf]
  24. Tom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer
    Cryptology As a Network Service. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  25. Drew Dean, Matthew K. Franklin, Adam Stubblefield
    An Algebraic Approach to IP Traceback. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  26. Payman Mohassel, Matthew K. Franklin
    Efficient Polynomial Operations in the Shared-Coefficients Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:44-57 [Conf]
  27. Payman Mohassel, Matthew K. Franklin
    Efficiency Tradeoffs for Malicious Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:458-473 [Conf]
  28. Matthew K. Franklin, Armen Gabrielian
    A Transformational Method for Verifying Safety Properties in Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1989, pp:112-125 [Conf]
  29. Armen Gabrielian, Matthew K. Franklin
    State-Based Specification of Complex Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1988, pp:2-11 [Conf]
  30. Amos Beimel, Matthew K. Franklin
    Edge Eavesdropping Games. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:1-17 [Conf]
  31. Bernardo A. Huberman, Matthew K. Franklin, Tad Hogg
    Enhancing privacy and trust in electronic communities. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 1999, pp:78-86 [Conf]
  32. Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi
    Mutual Search (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SODA, 1998, pp:481-489 [Conf]
  33. Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean
    Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf]
  34. Matthew K. Franklin, Moti Yung
    Communication Complexity of Secure Computation (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    STOC, 1992, pp:699-710 [Conf]
  35. Matthew K. Franklin, Moti Yung
    Secure hypergraphs: privacy from partial broadcast (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    STOC, 1995, pp:36-44 [Conf]
  36. Matthias Fitzi, Matthew K. Franklin, Juan A. Garay, S. Harsha Vardhan
    Towards Optimal and Efficient Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:311-322 [Conf]
  37. Amos Beimel, Matthew K. Franklin
    Weakly-Private Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:253-272 [Conf]
  38. Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin
    Secure Linear Algebra Using Linearly Recurrent Sequences. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:291-310 [Conf]
  39. Amos Beimel, Matthew K. Franklin
    Reliable Communication over Partially Authenticated Networks. [Citation Graph (0, 0)][DBLP]
    WDAG, 1997, pp:245-259 [Conf]
  40. Matthew K. Franklin, Juan A. Garay, Moti Yung
    Self-Testing/Correcting Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    DISC, 1999, pp:269-283 [Conf]
  41. Armen Gabrielian, Matthew K. Franklin
    Multilevel Specification of Real Time Systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:5, pp:50-60 [Journal]
  42. Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi
    Mutual Search [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  43. Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi
    Mutual Search. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1999, v:46, n:4, pp:517-536 [Journal]
  44. Dan Boneh, Matthew K. Franklin
    Efficient generation of shared RSA keys. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2001, v:48, n:4, pp:702-722 [Journal]
  45. Matthew K. Franklin, Zvi Galil, Moti Yung
    Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2000, v:47, n:2, pp:225-243 [Journal]
  46. Matthew K. Franklin, Dahlia Malkhi
    Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:4, pp:237-256 [Journal]
  47. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
    The Omega Key Management Service. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:4, pp:267-288 [Journal]
  48. Jeffrey Considine, Matthias Fitzi, Matthew K. Franklin, Leonid A. Levin, Ueli M. Maurer, David Metcalf
    Byzantine Agreement Given Partial Broadcast. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:3, pp:191-217 [Journal]
  49. Matthew K. Franklin, Stuart Haber
    Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:4, pp:217-232 [Journal]
  50. Matthew K. Franklin, Rebecca N. Wright
    Secure Communication in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:1, pp:9-30 [Journal]
  51. Dan Boneh, Matthew K. Franklin
    Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2003, v:32, n:3, pp:586-615 [Journal]
  52. Matthew K. Franklin, Moti Yung
    Secure Hypergraphs: Privacy from Partial Broadcast. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2004, v:18, n:3, pp:437-450 [Journal]
  53. Amos Beimel, Matthew K. Franklin
    Reliable Communication over Partially Authenticated Networks. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:220, n:1, pp:185-210 [Journal]
  54. Drew Dean, Matthew K. Franklin, Adam Stubblefield
    An algebraic approach to IP traceback. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:119-137 [Journal]
  55. Matthew K. Franklin, Michael K. Reiter
    The Design and Implementation of a Secure Auction Service. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:5, pp:302-312 [Journal]
  56. Matthew K. Franklin, Mark Gondree, Payman Mohassel
    Multi-party Indirect Indexing and Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:283-297 [Conf]

  57. Fair Threshold Decryption with Semi-Trusted Third Parties. [Citation Graph (, )][DBLP]


  58. Efficient and Secure Evaluation of Multivariate Polynomials and Applications. [Citation Graph (, )][DBLP]


  59. Communication-Efficient Private Protocols for Longest Common Subsequence. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002